InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
What will be the ciphered text if route cipher is used for encrypting the plain text “SANFOUNDRY” with a number of columns given to be 5 and route of reading is down the columns?(a) SUANNDFROY(b) SORAFUDYNN(c) SNAUDNORFY(d) SANFOUNDRYThe question was posed to me during an online exam.The origin of the question is Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct CHOICE is (a) SUANNDFROY |
|
| 102. |
What will be the ciphered text if route cipher is used for encrypting the plain text “SANFOUNDRY” with number of columns given to be 5 and route from the bottom right anti clockwise?(a) SUANNDFROY(b) SORAFUDYNN(c) YOFNASUNDRY(d) SANFOUNDRYI had been asked this question by my school principal while I was bunking the class.This intriguing question comes from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» RIGHT OPTION is (c) YOFNASUNDRY Explanation: For encrypting a plain text using route cipher we use a table having 5 columns as shown below. Then we READ from the bottom right anti CLOCKWISE to cipher the plain text. S A N F O U N D R Y So the ciphered text becomes “YOFNASUNDRY”. |
|
| 103. |
What will be the plain text corresponding to cipher text “SFNUFACT” if with number of columns are given to be 3 and route of reading is from the bottom right anti clockwise?(a) FACTSFUN(b) FACTFUNS(c) FUNSFACT(d) FUNFACTSI have been asked this question in an interview for internship.I need to ask this question from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (d) FUNFACTS |
|
| 104. |
What will be the plain text corresponding to cipher text “RSEADC” if with the number of columns are given to be 3 and route of reading is down the columns?(a) SACRED(b) DERSAC(c) REDSAC(d) SEDRACI have been asked this question during an interview.My question is taken from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT OPTION is (c) REDSAC |
|
| 105. |
Router cipher becomes less secure when we have to encrypt longer messages.(a) true(b) falseI had been asked this question in class test.This question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct OPTION is (b) false |
|
| 106. |
Rail fence cipher is more secure as compared to route cipher?(a) true(b) falseI had been asked this question in an interview for job.This question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» Right OPTION is (b) false |
|
| 107. |
Route cipher is closely related to?(a) Autokey cipher(b) Hill cipher(c) Rail fence cipher(d) Columnar transposition cipherI got this question in an online interview.This intriguing question originated from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» Correct choice is (c) Rail fence cipher |
|
| 108. |
Which of the following ciphers are created by shuffling the letters of a word?(a) playfair cipher(b) route cipher(c) vigenere cipher(d) hill cipherI had been asked this question in a job interview.My doubt is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» CORRECT choice is (b) route cipher The best I can EXPLAIN: In transposition cipher the LETTERS of the given data are shuffled in a particular ORDER, FIXED by a given rule. Route cipher is the only transposition cipher out of the given options. |
|
| 109. |
Encryption in Route cipher is done ___________(a) by arranging the letters in a zig zag fashion in a table(b) by randomly arranging letters(c) by following an imaginary pattern drawn on a grid(d) by swapping adjacent lettersThis question was addressed to me during an internship interview.The query is from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» Right option is (C) by following an imaginary pattern drawn on a grid |
|
| 110. |
Route cipher is an example of ____________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherThe question was posed to me in unit test.Asked question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Right CHOICE is (c) transposition cipher |
|
| 111. |
What is route cipher?(a) a transposition cipher that performs encryption by following an imaginary pattern on a grid(b) a substitution cipher that performs encryption by following an imaginary pattern on a grid(c) a transposition cipher that performs encryption by following a zig zag pattern on a grid(d) a substitution cipher that performs encryption by following a zig zag pattern on a gridThis question was addressed to me by my school teacher while I was bunking the class.This is a very interesting question from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (a) a transposition CIPHER that performs encryption by following an imaginary pattern on a grid |
|
| 112. |
What will be the ciphered text if rail fence cipher is used for encrypting the plain text “SANFOUNDRY” with the key value given to be 2?(a) SNONRAFUDY(b) SORAFUDYNN(c) SNAUDNORFY(d) SANFOUNDRYI have been asked this question in an online interview.Question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» The correct OPTION is (a) SNONRAFUDY |
|
| 113. |
In which of the following cipher the plain text and the ciphered text have same letters?(a) autokey cipher(b) rail fence cipher(c) vigenere cipher(d) additive cipherI have been asked this question in an interview for job.My question is from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (b) rail fence cipher |
|
| 114. |
Rail fence cipher is more secure than one time pad cipher.(a) True(b) FalseThis question was posed to me at a job interview.I need to ask this question from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (B) False |
|
| 115. |
What will be the plain text corresponding to cipher text “SCSEMG” if rail fence cipher is used with key value 2?(a) MSGSEC(b) SECMSG(c) GSMSEC(d) SECGSMThis question was posed to me during an online exam.The doubt is from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT choice is (b) SECMSG |
|
| 116. |
The number of columns in the table used for encryption in rail fence cipher depends upon the given key value.(a) True(b) FalseI had been asked this question during an interview.I'd like to ask this question from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Right answer is (b) False |
|
| 117. |
Which of the following is are two types of traditional cipher?(a) transposition cipher and replacement cipher(b) transposition cipher and substitution cipher(c) transforming cipher and substitution cipher(d) transforming cipher and replacement cipherI got this question during an internship interview.This intriguing question originated from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct ANSWER is (b) transposition CIPHER and SUBSTITUTION cipher |
|
| 118. |
Which of the following is not a type of poly alphabetic cipher?(a) Autokey cipher(b) Hill cipher(c) One time pad cipher(d) Additive cipherThis question was posed to me during an interview.Query is from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct choice is (d) Additive cipher |
|
| 119. |
Which of the following ciphers are created by shuffling the letters of a word?(a) substitution cipher(b) transposition cipher(c) vigenere cipher(d) hill cipherThis question was posed to me in my homework.I'm obligated to ask this question of Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» The correct CHOICE is (b) TRANSPOSITION CIPHER |
|
| 120. |
Encryption in Rail fence cipher is done using _____________(a) by arranging the letters in a zig zag fashion in a table(b) by randomly arranging letters(c) by arranging letters in vigenere table(d) by swapping adjacent lettersThis question was addressed to me in an international level competition.Enquiry is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct answer is (a) by arranging the LETTERS in a zig ZAG fashion in a table |
|
| 121. |
Rail fence cipher is an example of ___________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherI got this question during an interview.My enquiry is from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» Right option is (c) TRANSPOSITION cipher |
|
| 122. |
What is the alternative name given to Rail fence cipher?(a) random cipher(b) matrix cipher(c) zig zag cipher(d) columnar cipherThis question was posed to me in homework.My doubt is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Right answer is (c) ZIG zag cipher |
|
| 123. |
What will be the ciphered text if the plain text “SAN” is encrypted using hill cipher with keyword as “GYBNQKURP”?(a) RAJ(b) JAR(c) ARJ(d) AJRThe question was asked by my school principal while I was bunking the class.The doubt is from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct choice is (a) RAJ |
|
| 124. |
A key matrix used for encryption in hill cipher must be?(a) invertible matrix(b) non invertible matrix(c) square matrix(d) rectangular matrixI got this question during an online exam.The above asked question is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT answer is (a) invertible matrix |
|
| 125. |
What will be the size of a key matrix if the plain text is “SECRET”?(a) 1×6(b) 5×1(c) 6×1(d) 6×6The question was asked during a job interview.This interesting question is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT ANSWER is (d) 6×6 |
|
| 126. |
What will be the plain text corresponding to cipher text “YGQ“ if hill cipher is used with keyword as “GYBNQKURP”?(a) SECRET(b) WORLD(c) DOLLAR(d) HELLOThe question was posed to me during an interview.My query is from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT answer is (a) SECRET |
|
| 127. |
Hill cipher is harder to crack than playfair cipher.(a) True(b) FalseI got this question during an interview.My question comes from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (b) False |
|
| 128. |
Which of the following is hardest to break using frequency analysis?(a) Vigenere cipher(b) Hill cipher(c) Caesar cipher(d) Affine cipherThis question was posed to me in an internship interview.My question is based upon Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Right choice is (b) HILL CIPHER |
|
| 129. |
Which of the following was the first poly graphic cipher to be able to operate on more than 3 letters at once?(a) autokey cipher(b) hill cipher(c) one time pad cipher(d) playfair cipherI got this question in quiz.The doubt is from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» RIGHT choice is (b) hill CIPHER Explanation: Poly graphic cipher is a type of substitution cipher in which substitution is performed over a BLOCK of LETTERS. Hill cipher was the first poly graphic cipher to be able to operate on more than 3 letters at once. |
|
| 130. |
What is poly graphic substitution cipher?(a) a substitution based cipher which uses multiple substitutions at different positions(b) a substitution based cipher which uses fixed substitution over entire plain text(c) a substitution based cipher in which substitution is performed over a block of letters(d) a transposition based cipher which uses fixed substitution over entire plain textI had been asked this question in an interview for job.The query is from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT choice is (C) a substitution based cipher in which substitution is performed over a block of letters |
|
| 131. |
Encryption in hill cipher is done using ______________(a) matrix multiplication(b) a 5×5 table(c) vigenere table(d) matrix inversionThis question was posed to me in an interview for internship.Question is taken from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» The correct option is (a) matrix MULTIPLICATION |
|
| 132. |
Hill cipher is an example of ____________(a) mono-alphabetic cipher(b) substitution cipher(c) transposition cipher(d) additive cipherI have been asked this question in an online quiz.I'd like to ask this question from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» The correct choice is (b) substitution CIPHER |
|
| 133. |
Hill cipher requires prerequisite knowledge of?(a) integration(b) differentiation(c) matrix algebra(d) differential equationThis question was posed to me in quiz.The query is from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct answer is (c) MATRIX algebra |
|
| 134. |
What is the rule for encryption in playfair cipher if the letters in a pair does not appear in same row or column?(a) they are replaced by the letter appearing immediately below them respectively(b) they are replaced by the letter appearing immediately right to them respectively(c) they are replaced by the letter of the same row at the corner of the rectangle defined by the original pair respectively(d) that pair is neglectedI got this question in final exam.The question is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct ANSWER is (c) they are REPLACED by the letter of the same row at the CORNER of the rectangle defined by the original pair respectively |
|
| 135. |
What is the rule for encryption in playfair cipher if the letters in a pair appear in same column?(a) they are replaced by the letter appearing immediately below them respectively(b) they are replaced by the letter appearing immediately right to them respectively(c) they are replaced by the letters at the corner of the row(d) that pair is neglectedI have been asked this question in an online interview.The query is from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Right option is (a) they are REPLACED by the letter appearing IMMEDIATELY below them respectively |
|
| 136. |
What will be the ciphered text if the string “SANFOUNDRY” is given as input to the code of playfair cipher with keyword as “SECRET” (assuming j is combined with i)?(a) ZHQAPNPAFR(b) AHQAPNPAFR(c) HAQAPNPAFR(d) QHAAPNPAFRThe question was asked in unit test.My question comes from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (b) AHQAPNPAFR |
|
| 137. |
What is the rule for encryption in playfair cipher if the letters in a pair appear in same row?(a) they are replaced by the letter appearing immediately below them respectively(b) they are replaced by the letter appearing immediately right to them respectively(c) they are replaced by the letter at the corner of the row(d) that pair is neglectedI had been asked this question in an interview for internship.Question is taken from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» RIGHT answer is (b) they are replaced by the LETTER APPEARING immediately right to them respectively Best explanation: If the letters in a pair appear in same row then they are replaced by the letters appearing immediately right to them respectively. If the element to be replaced appears at the CORNER of the row then we wrap around to the left side of that row. |
|
| 138. |
What is the rule for encryption in playfair cipher if the letters in a pair are identical?(a) then that pair is neglected(b) a null is added in between the letters(c) one of the identical letter is replaced by some other letter(d) then both of the letters are replaced by the letter appearing just next in the rowThe question was posed to me in an online interview.I'm obligated to ask this question of Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (b) a null is ADDED in between the LETTERS |
|
| 139. |
What will be the plain text corresponding to cipher text “BPKYFS” if playfair cipher is used with keyword as “SECRET” (assuming j is combined with i)?(a) INDIAN(b) WORLD(c) DOLLAR(d) HELLOThe question was asked in an interview for job.I'm obligated to ask this question of Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Right answer is (C) DOLLAR |
|
| 140. |
Playfair cipher is harder to crack than keyword cipher.(a) True(b) FalseThis question was addressed to me during an online exam.The origin of the question is Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» CORRECT option is (a) True For explanation: Keyword cipher is less secure than playfair cipher. It is due to the FACT that keyword cipher is mono alphabetic and thus can be cracked using FREQUENCY ANALYSIS. But playfair cipher being a poly graphic substitution cipher is harder to break using this method. |
|
| 141. |
Which of the following was the first diagram substitution cipher?(a) autokey cipher(b) hill cipher(c) one time pad cipher(d) playfair cipherI have been asked this question by my school teacher while I was bunking the class.My question is from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» Right choice is (d) playfair cipher |
|
| 142. |
Which of the following is hardest to break using frequency analysis?(a) Vigenere cipher(b) Autokey cipher(c) Playfair cipher(d) Rotor cipherThe question was posed to me in unit test.My query is from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Right option is (c) Playfair cipher |
|
| 143. |
Which of the following correctly defines poly graphic substitution cipher?(a) a substitution based cipher which uses multiple substitutions at different positions(b) a substitution based cipher which uses fixed substitution over entire plain text(c) a substitution based cipher in which substitution is performed over a block of letters(d) a transposition based cipher which uses fixed substitution over entire plain textThis question was posed to me in an international level competition.My doubt stems from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» CORRECT choice is (c) a substitution based CIPHER in which substitution is performed over a block of letters The best I can EXPLAIN: POLY graphic cipher is a TYPE of substitution cipher in which substitution is performed over a block of letters. Playfair cipher is an example of poly graphic cipher. |
|
| 144. |
Encryption in Autokey cipher is done using __________(a) a 5×5 table(b) a 13×2 table(c) vigenere table(d) a 6×6 tableI had been asked this question in a national level competition.This interesting question is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Correct answer is (c) VIGENERE table |
|
| 145. |
Playfair cipher is an example of __________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherI had been asked this question in quiz.I'm obligated to ask this question of Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» RIGHT choice is (b) POLY-alphabetic cipher For explanation: Playfair cipher is a substitution cipher. It falls under the category of poly alphabetic cipher as it uses multiple substitution at different POSITIONS in order to cipher the plain text. |
|
| 146. |
What is the alternative name of playfair cipher?(a) Wadsworth’s cipher(b) Wheatstone playfair cipher(c) Playfair rectangle(d) Wheatstone cipherThe question was posed to me in exam.The origin of the question is Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» The correct answer is (B) Wheatstone playfair CIPHER |
|
| 147. |
Vigenere cipher is harder to crack than autokey cipher.(a) true(b) falseThe question was posed to me during an online exam.Origin of the question is Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» Correct answer is (B) false |
|
| 148. |
What will be the ciphered text if the string “SECRET” is given as input to the code of autokey cipher with keyword as “SANFOUNDRY”?(a) KEPWSN(b) EKWPSN(c) EKWPSNFDED(d) KEPWSNFDEDI had been asked this question in an interview for job.Origin of the question is Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (a) KEPWSN |
|
| 149. |
In which of the following cipher the plain text and the ciphered text does not have same number of letters?(a) affine cipher(b) autokey cipher(c) columnar cipher(d) additive cipherI had been asked this question during an interview.Origin of the question is Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT answer is (B) AUTOKEY cipher |
|
| 150. |
Autokey cipher is also known as?(a) vigenere cipher(b) autoclave cipher(c) auto key cipher(d) auto cipherThis question was posed to me during an interview for a job.Question is taken from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» Correct answer is (b) autoclave CIPHER |
|